poppopjmp / spiderfootLinks
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage
☆133Updated 3 months ago
Alternatives and similar repositories for spiderfoot
Users that are interested in spiderfoot are comparing it to the libraries listed below
Sorting:
- A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachFor…☆137Updated last week
- Tor onion address lookup☆59Updated 3 weeks ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆64Updated 3 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆77Updated this week
- Sniffing out well-known threat groups☆64Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆57Updated 2 years ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 11 months ago
- ☆140Updated last year
- All-sources tool to search websites by favicons☆184Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆119Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆147Updated 2 weeks ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 4 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆168Updated 10 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 11 months ago
- Passive leak enumeration tool.☆244Updated last week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆67Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- A repository of credential stealer formats☆239Updated 7 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- A Linkedin Activity date Finder☆65Updated 9 months ago
- Command Line Sock Puppet Creator for Investigators.☆83Updated 10 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆68Updated 9 months ago
- Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecuri…☆33Updated 5 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 3 months ago
- DPULSE - Tool for complex approach to domain OSINT☆158Updated 3 weeks ago